{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:11:59Z","timestamp":1761401519013,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1109\/cscwd.2008.4537071","type":"proceedings-article","created":{"date-parts":[[2010,12,13]],"date-time":"2010-12-13T16:00:45Z","timestamp":1292256045000},"page":"743-748","source":"Crossref","is-referenced-by-count":8,"title":["Scan attack detection based on distributed cooperative model"],"prefix":"10.1109","author":[{"family":"Wei Zhang","sequence":"first","affiliation":[]},{"family":"Shaohua Teng","sequence":"additional","affiliation":[]},{"family":"Xiufen Fu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Network Intrusion Detection An Analyst's Handbook","year":"2000","author":"northcutt","key":"15"},{"key":"13","first-page":"163","article-title":"a new distributed portscan detection method","author":"song","year":"2003","journal-title":"Computer Engineering and Applications"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/CSCWD.2007.4281552"},{"key":"11","first-page":"92","article-title":"a port-scanning detection method based on fuzzy set theory","volume":"23","author":"ji","year":"2003","journal-title":"Computer Applications"},{"key":"12","first-page":"311","article-title":"a scan attack detection model by combining feature and statistic analysis","volume":"1","author":"teng","year":"2004","journal-title":"Journal of Computing and Information Science in Engineering"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00112-7"},{"key":"2","first-page":"291","article-title":"research of portscan detection method","volume":"23","author":"tang","year":"2003","journal-title":"Computer Applications"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766911"},{"key":"10","first-page":"1046","article-title":"a portscan detection method based on dempster-shafer theory of evidence","volume":"34","author":"lai","year":"2006","journal-title":"Acta Electronica Sinica"},{"key":"7","article-title":"detecting low-profile probes and novel denial-of-service attacks","author":"basu","year":"2001","journal-title":"Proceedings of the 2001 IEEE Workshop on Information Assurance and Security"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194880"},{"key":"5","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/JCS-2002-101-205","article-title":"practical automated detection of stealthy portscans","volume":"10","author":"staniford","year":"2002","journal-title":"Computers & Security"},{"journal-title":"Snort 2 0 intrusion detection","year":"2004","author":"caswell","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301325"},{"key":"8","first-page":"34","article-title":"the quick way for the network abnormal behaviors upon the ratio distribution of the number of tcp packets","volume":"26","author":"chen","year":"2005","journal-title":"Journal of Communication"}],"event":{"name":"in Design (CSCWD)","start":{"date-parts":[[2008,4,16]]},"location":"Xian, China","end":{"date-parts":[[2008,4,18]]}},"container-title":["2008 12th International Conference on Computer Supported Cooperative Work in Design"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4530852\/4536938\/04537071.pdf?arnumber=4537071","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T13:11:31Z","timestamp":1497877891000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4537071\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cscwd.2008.4537071","relation":{},"subject":[],"published":{"date-parts":[[2008,4]]}}}